Sciweavers

2875 search results - page 444 / 575
» Using separation of concerns for embedded systems design
Sort
View
SOUPS
2006
ACM
15 years 3 months ago
Password management strategies for online accounts
Given the widespread use of password authentication in online correspondence, subscription services, and shopping, there is growing concern about identity theft. When people reuse...
Shirley Gaw, Edward W. Felten
CODASPY
2012
13 years 5 months ago
Towards end-to-end secure content storage and delivery with public cloud
Recent years have witnessed the trend of leveraging cloudbased services for large scale content storage, processing, and distribution. Security and privacy are among top concerns ...
Huijun Xiong, Xinwen Zhang, Danfeng Yao, Xiaoxin W...
ICFP
2001
ACM
15 years 10 months ago
Recursive Structures for Standard ML
Standard ML is a statically typed programming language that is suited for the construction of both small and large programs. "Programming in the small" is captured by St...
Claudio V. Russo
ECSCW
2007
14 years 11 months ago
What Did I Miss? Visualizing the Past through Video Traces
Always-on media spaces broadcast video between collaborators to provide mutual awareness and to encourage casual interaction. This video can be easily recorded on the fly as a vide...
Michael Nunes, Saul Greenberg, M. Sheelagh T. Carp...
VR
2002
IEEE
210views Virtual Reality» more  VR 2002»
15 years 2 months ago
Distributed Applications for Collaborative Augmented Reality
This paper focuses on the distributed architecture of the collaborative augmented reality system Studierstube. The system allows multiple users to experience a shared 3D workspace...
Dieter Schmalstieg, Gerd Hesina